Stryker is rebuilding after a cyberattack that wiped about 80,000 devices via a compromised Intune admin account, with up to 50TB of data reportedly exfiltrated. As US systems face similar probes, Australia is exposed, increasing pressure on boards to tighten cyber controls and readiness.
Amsterdam-based Wonderful has raised $150M in a Series B round led by Insight Partners, valuing the enterprise AI agent platform at $2B. The funding will scale its hyper-local deployment model, which embeds teams with clients to accelerate AI adoption in complex industries across 30+ countries.
Google has issued an emergency patch for a high-severity zero-day (CVE-2026-3910) in its V8 JavaScript engine, which is being actively exploited in the wild. The flaw allows arbitrary code execution, posing a significant risk to billions of Chrome users globally, including in Australia.
20th March 2026 Cyber Update: Headlines of the Week
Stryker is rebuilding after a cyberattack that wiped about 80,000 devices via a compromised Intune admin account, with up to 50TB of data reportedly exfiltrated. As US systems face similar probes, Australia is exposed, increasing pressure on boards to tighten cyber controls and readiness.
Cyber News Centre's cyber update for 20th March 2026: The last 72 hours have underscored how quickly geopolitical cyber tensions can spill into healthcare, law enforcement and, by extension, Australia’s own critical systems.
The Update and Why It Matters
The Update: Medical technology group Stryker says it is working to restore its systems after a cyberattack that reportedly enabled pro-Iranian actors to remotely wipe tens of thousands of employee devices. Open-source reporting suggests the attackers gained access to a Microsoft Intune administrator account and then used Intune’s remote-wipe capability to erase data across roughly 80,000 managed devices within hours. A pro-Iran hacktivist persona, “Handala,” has claimed responsibility, framing the incident as a politically motivated wiper-style operation. The group alleges it both destroyed systems and exfiltrated up to 50 TB of corporate data, including information from employees’ personal devices enrolled in Stryker’s mobile device management environment.
In parallel, US authorities are probing a suspected Chinese compromise of an FBI surveillance platform, a reminder that core law‑enforcement infrastructure is now a live target, not off‑limits “blue space”.
For Australia, the technical details matter less than the direction of travel. Local threat briefings this week flag an upswing in ransomware campaigns and exploitation of new zero‑day vulnerabilities in Cisco SD‑WAN and other edge systems commonly deployed by Australian healthcare, telco and government agencies. That places domestic networks only one step removed from the kind of destructive tradecraft now being field‑tested offshore.
Regulators are responding. AFSA’s March update reiterates expectations for stronger cyber resilience, faster incident reporting and tighter controls around fraud, identity theft and cyber‑enabled financial crime. Agencies and boards are being told, in effect, that “we were collateral damage” will not wash as a defence when basic segmentation, patching and supplier oversight were missing.
Why It Matters: The warning for Australian organisations is blunt: if your systems look like those being successfully hit in the US and Europe, assume the same playbooks are already being pointed at you – and that regulators will expect you to be ready. Incidents like Stryker strengthen the case for Australian regulators to demand tighter third‑party and medical‑device cyber governance, and for boards to treat MDM, Intune and similar tools as high‑risk control points, not background IT plumbing
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
Google has issued an emergency patch for a high-severity zero-day (CVE-2026-3910) in its V8 JavaScript engine, which is being actively exploited in the wild. The flaw allows arbitrary code execution, posing a significant risk to billions of Chrome users globally, including in Australia.
Singtel executives fronted a Senate inquiry, categorically denying explosive allegations that a secret ransom was paid to hackers following the massive 2022 Optus data breach that exposed personal information of 9.8 million Australians, amid ongoing inquiry into the telco's operational failures.
Joint advisory by Australian, New Zealand, and Tongan cyber authorities warns of rising INC Ransom attacks on critical infrastructure. The RaaS group has breached 11 Australian organisations, mainly in healthcare and professional services.
Microsoft’s March 2026 Patch Tuesday fixes 83 flaws, including three critical Office vulnerabilities exploitable through the Preview Pane that allow code execution without opening files, and a Copilot-linked Excel bug that could leak data. The ACSC urges immediate patching under the Essential Eight.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!